You are here: hacking technology > firewall > Content
Hot Articles
Recommend Articles
New Articles
Clearly recognizes the firewall evaluation and the management
  Add date: 07/15/2008   Publishing date: 07/15/2008   Hits: 5
Total 4 pages, Current page:1, Jump to page:
 
in 2007, the author altogether has written two firewall management aspect commentary, one is "Chinese Computer Newspaper" on "Firewall Evaluation Must Dodge Six Erroneous zones", one is "Computer World" on "Firewall Manages In a big way Four Silly". Two big IT media, just right has come one.

6 add on 4, happen to is 10. How does first 6 instructions to a subordinate official everybody buy the wall, how does latter 4 instructions to a subordinate official everybody use the wall. Thinks carefully that might be truly 10 police who the firewall managed has said that the conformity got up, was worth the firewall superintendents referring very much. The attention, superintendent's category is not only a manager, but also has the policy-maker.

Arranges in order:

The firewall evaluation - - buys

The first article: Do not believe mistakenly the ambiguous experimental condition the astonishing digit

Has read personally by the innumerable firewall product advertisement, each one sureproof nominal's 4G volume of goods handled lets the human dazzle, but if “64 bytes packets”, “the line speed”, “insisted that several minutes” and so on phrase throws, the sales personnels first will change to volume of goods handled are afraid to say a word. Therefore cannot readily believe the manufacturer provides each data, must take the standard experimental condition the test result to come compared to rightly, or builds the environment to test personally.

The second article: Do not like the digit, but does not consider the manipuility

In the evaluation, the user often many excessively pays attention to the performance figure, but says regarding the actual network security management, between two products 2% differences, 5% difference 10% differences, really can bring essential the difference? A firewall disposition contact surface operates whether conveniently? Whether or not complete diary management function? Whether does this wall save the diary? Whether there is monthly CPU, memory statistics function? Whether to facilitate the inquiry to match the strategy ......Compares the performance figure to come, to evaluate these to look that resembles does not cut the subject, but this kind of question but “who knows with who”!

The third article: Do not pay attention to the gaudy function, actually does not understand the performance the concealed worry

This year's firewall, the function is very much, access control, anti-virus, invasion examination/defense, VPN, calls the function isomerism to be also good, is called the unification threat management to be also good, a general store is likely same. Said that these functions “gaudy”, is because they start, to hardware source performance swallow ability ultra person's imagination. Therefore, draws up time the evaluation plan easily do not these rows in the function item?

The fourth article: Does not want the unscientific regarding high performance hardware construction

 
Other pages: : 1 * 2 * 3 * 4 * Next>>
Prev:Stops up the long-distance access VPN security crack with the firewall Next:About low in high security rank firewall's several principles

Comment:

Category: Home > firewall